Policy-driven reflective enforcement of security policies
暂无分享,去创建一个
[1] Ian Welch,et al. Re-engineering Security as a Crosscutting Concern , 2003, Comput. J..
[2] Hemma Prafullchandra,et al. Going Beyond the Sandbox: An Overview of the New Security Architecture in the Java Development Kit 1.2 , 1997, USENIX Symposium on Internet Technologies and Systems.
[3] Antonio Corradi,et al. A flexible access control service for Java mobile code , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).
[4] Guy L. Steele,et al. The Java Language Specification , 1996 .
[5] Emil C. Lupu,et al. The Ponder Policy Specification Language , 2001, POLICY.
[6] William G. Griswold,et al. An Overview of AspectJ , 2001, ECOOP.
[7] Tim Howes,et al. The String Representation of Standard Attribute Syntaxes , 1995, RFC.
[8] Ian Welch,et al. Kava - Using Byte code Rewriting to add Behavioural Reflection to Java , 2001, COOTS.
[9] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[10] Ian Welch,et al. Using Reflection as a Mechanism for Enforcing Security Policies on Compiled Code , 2002, J. Comput. Secur..
[11] David E. Evans,et al. Flexible policy-directed code safety , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).